34,040 research outputs found

    Digital Piracy of MP3s: Consumer and Ethical Predispositions

    Get PDF
    Purpose – Illegal downloading of music has become an inexorable and rampant activity particularly among college students who have been little deterred by industry legal actions. The purpose of this research is to examine the present state of downloading and how ethical orientation and attitudes towards MP3 piracy impact such activities. The paper also aims to use ethical scenarios as a way of understanding the ethical reasoning in illegal downloading. Design/methodology/approach – Key research questions are proposed that are related to illegal downloading. A sample of 364 university students was used to examine each research question. Statistical results are reported. Findings – The results clearly show that downloading continues at a high rate today driven by a strong belief that it is not ethically wrong. Ethical orientation was found to be positively associated with awareness of the social cost of downloading, consequences of downloading, and ethical belief in downloading. Ethical scenarios show that ethical orientation is also associated with downloading activities and with stealing. Other results indicate that respondents believe that their peers are more prone to stealing music and downloading MP3s illegally. Fear of consequences does seem to have an impact on the propensity to download illegally. Practical implications – The paper contributes to inform industry representatives that appeals to ethics or guilt are not likely to deter illegal downloading measurably. The use of punishment for downloaders may have a short-term effect but other (more positive) measures are required. Originality/value – No research has examined downloading of MP3s in the manner developed in this paper. The paper contributes to a better understanding of consumer behavior among those who download. The results provide insight into a serious problem in the recording industry that is likely to persist in the distant future unless sound measures are developed

    Negotiation processes within inter-organizational alliances

    Get PDF
    This paper describesthe negotiation component of E-Alliance, a software infrastructure defined for supporting negotiation activities in concurrent inter-organizational alliances. The E-Alliance’s main intent is to preserve the autonomy of organizations grouped in an alliance. The purpose of this work is to offer support for small and medium enterprises which cannot or do not want to fulfill a big contract alone. This approach is illustrated by a sample scenario where partners are printshops grouped into an alliance to better accomplish customers’ demands.negotiation, middleware, virtual enterprises, multi-agent systems, interaction protocol

    A New Constructivist AI: From Manual Methods to Self-Constructive Systems

    Get PDF
    The development of artificial intelligence (AI) systems has to date been largely one of manual labor. This constructionist approach to AI has resulted in systems with limited-domain application and severe performance brittleness. No AI architecture to date incorporates, in a single system, the many features that make natural intelligence general-purpose, including system-wide attention, analogy-making, system-wide learning, and various other complex transversal functions. Going beyond current AI systems will require significantly more complex system architecture than attempted to date. The heavy reliance on direct human specification and intervention in constructionist AI brings severe theoretical and practical limitations to any system built that way. One way to address the challenge of artificial general intelligence (AGI) is replacing a top-down architectural design approach with methods that allow the system to manage its own growth. This calls for a fundamental shift from hand-crafting to self-organizing architectures and self-generated code – what we call a constructivist AI approach, in reference to the self-constructive principles on which it must be based. Methodologies employed for constructivist AI will be very different from today’s software development methods; instead of relying on direct design of mental functions and their implementation in a cog- nitive architecture, they must address the principles – the “seeds” – from which a cognitive architecture can automatically grow. In this paper I describe the argument in detail and examine some of the implications of this impending paradigm shift

    P4CEP: Towards In-Network Complex Event Processing

    Full text link
    In-network computing using programmable networking hardware is a strong trend in networking that promises to reduce latency and consumption of server resources through offloading to network elements (programmable switches and smart NICs). In particular, the data plane programming language P4 together with powerful P4 networking hardware has spawned projects offloading services into the network, e.g., consensus services or caching services. In this paper, we present a novel case for in-network computing, namely, Complex Event Processing (CEP). CEP processes streams of basic events, e.g., stemming from networked sensors, into meaningful complex events. Traditionally, CEP processing has been performed on servers or overlay networks. However, we argue in this paper that CEP is a good candidate for in-network computing along the communication path avoiding detouring streams to distant servers to minimize communication latency while also exploiting processing capabilities of novel networking hardware. We show that it is feasible to express CEP operations in P4 and also present a tool to compile CEP operations, formulated in our P4CEP rule specification language, to P4 code. Moreover, we identify challenges and problems that we have encountered to show future research directions for implementing full-fledged in-network CEP systems.Comment: 6 pages. Author's versio
    corecore